Search
Recommended Sites
Related Links






Valid XHTML 1.0 Transitional

Valid CSS!
   

Informative Articles

Advertising Agency Software
There are many different types of software that an advertising agency needs to conduct business efficiently. Here are some examples of tasks that can be supported by software that is currently available to agencies: - Create estimates and...

Effective Software Development Process
There is never a guarantee of project success when endeavoring to build a sophisticated application. However, there are established steps to follow that will ensure a clear, concise scope, support for the team involved, and a solid opportunity for...

Lead Management Software
Efficient lead management is the cornerstone to good sales. Without some sort of lead management system, keeping track of follow-up calls, meetings, and details relating to prospective clients can be nearly impossible. With proper lead management...

"Pay-to-play" Educational Software Games?
Science Academy Software has developed a new business model or paradigm for Education. It is a web-based "pay to play" educational game site named ScienceAcademy.TV for high-bandwidth clients. This article discusses the issues and rationale behind...

Software Tools To Help Your Business Sell More
Sales are all about leverage, because there is only so much you can do on your own. But, with the help of these simple tools, you can easily double, triple and quadruple your productiviting and make more sales. PhoneTray Dialup PhoneTray Dialup...

 
HIPAA: Requirements For Intranet Collaboration Software


Sharing private health information over the internet can be a risky business. Unfortunately, as people become accustomed to doing most if not all of their personal business online, the demand for accessing this information online will grow to the point that health care providers will have no choice but to either provide access to this private health information or lose their customers.

The Health Insurance Portability and Accountability Act (HIPAA) was enacted to assure the confidentiality of patient information. This requires that health care providers employ stringent measures to assure that information shared on the internet is protected from unauthorized access.

The HIPAA Act requires health-providing entities to:

• Assign responsibility for security to a person or organization.

• Assess security risks and determine the major threats to the security and privacy of protected health information.

• Establish a program to address physical security, personnel security, technical security controls, and security incident response and disaster recovery.

• Certify the effectiveness of security controls.

• Develop policies, procedures and guidelines for use of personal computing devices (workstations, laptops, hand-held devices), and for ensuring mechanisms are in place that allow, restrict and terminate access (access control lists, user accounts, etc.) appropriate to an individual's status, change of status or termination.

• Implement access controls that may include encryption, context-based access, role-based access, or user-based access; audit control mechanisms, data authentication, and entity authentication

This law has serious implications for organizations that allow unauthorized access resulting in a breach in confidentiality.

Security is the key

Since the HIPAA law provides for both civil and criminal penalties for violations, data and access security is of the utmost importance. To assure HIPPA compliance, online document management on company intranets and extranets must include a number of security features:

• Secure web server – a server running secure socket layers is the minimum needed.

• Encrypted database – all data must be encrypted. Software is available that will encrypted all data sent between two computer over the internet.

• Secure access control -- in addition to a traditional user id and password, it may be a good idea to use a strong password or smart card as additional security.

• Session timeout – this assures that confidential data is not left on an unattended screen.

• Server monitoring – the secure web server needs to be strictly monitored to detect break-in attempts.

• Regular security audits – regular audits are required to make sure all security precautions are working properly.

• Personnel – system maintenance should be in the hands of qualified personnel familiar with HIPPA requirements



About the Author:

Laura Schweiker writes extensively on the use of technology by businesspeople and is an evangelist for online collaboration and intranet solutions.

Source: www.isnare.com

Sign up for PayPal and start accepting credit card payments instantly.